What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds known exploited vulnerability to its catalog
CISA has added a new vulnerability to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2026-42897 Cross-site scripting vulnerability in…
-
Several vulnerabilities in Fortinet products could allow remote code execution
We recommend that the following actions be taken: * Apply available patches provided by Fortinet to vulnerable systems immediately after appropriate testing. Apply available updates…
-
CISA adds known exploited vulnerability to its catalog
CISA has added a new vulnerability to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2026-0300 Palo Alto Networks PAN-OS…
-
Multiple vulnerabilities in Mozilla products could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-039ISSUE DATE(S):04/28/2026PREVIEW:Several vulnerabilities have been discovered in Mozilla products, the most serious of which could allow the execution of arbitrary code. Mozilla Firefox…













